"Exposure of Hard-coded Private Keys and Credentials in #curl Source Repository"
a "critical" issue.
We have this test suite in git...
"Exposure of Hard-coded Private Keys and Credentials in #curl Source Repository"
a "critical" issue.
We have this test suite in git...
"This report, including the verification steps and analysis, was prepared using an AI security assistant to ensure comprehensive and reproducible results."
Thanks. Great.
Multiple private/test RSA keys and example credentials were discovered embedded in the public curl source repository and associated documentation. These sensitive secrets were detected using automated tools (gitleaks) and manual review. Their presence could allow attackers to impersonate trusted curl infrastructure, decrypt traffic, or pivot into build or CI systems if reused, creating a severe...
That’s amazing for all the wrong reasons
@bagder classic! I got pulled into a Big Serious Meeting with the boss 15 years ago about this sort of thing once!
Thing is: it was literally foo/bar and had a name like “testCreds” 🤪
I’ll never forget the Senior Developer who was there to throw me under the bus, too!
(I quit shortly after)
@bagder lmao.
Did not know I was submitting crap.
"I just found this in the trashcan nearby. Didn't know it was garbage. Did you expect me to smell it or something?"
@bagder oh, we got one like these too (as a private business with no bounty or anything even). Extremely critical disclosure of credentials, abuse risk, lenghty "report" with long steps and stuff, with reproduction against a third party service.
We had the default maptiler key from element-web's default config.json served somewhere (it is in their github repository), alongside with… the URL of our server, served by that very same URL. Which is public.
A great loss of time indeed.
@bagder This just makes me want to scream.
But do they actually believe that they are submitting something useful?
Also: The act of asking another human "Hey, does this thing make sense?" seems to have been completely forgotten.
@bagder secret scanning is a good idea given the number of checked in keys in the world.
But we still have to explain every couple years to folks that the "compiler can process .pfx files" unit tests aren't security problems 😅
@StompyRobot @bagder I feel like you're looking to me for approval here but that sounds horrifying. It's at best in keeping with the letter rather than the spirit of requirements.
Needing to explain to the folks complaining about the checked in secret is more work but it is still the correct way to do that.
"The security impact of this vulnerability is severe and multi-faceted:"
omg who talks like this? 😂
was prepared using an AI security assistant
Whenever I read something like this I'm like: "Yeah, I'm not doing anything, too."